Planning for Security Management
暂无分享,去创建一个
[1] Maria Gini,et al. Deferred Planning and Sensor Use , 1990 .
[2] Daniel S. Weld,et al. Planning to gather inforrnation , 1996, AAAI 1996.
[3] Qiang Yang,et al. A Theory of Conflict Resolution in Planning , 1992, Artif. Intell..
[4] Michela Milano,et al. Interactive Constraint Satisfaction techniques for Information Gathering in Planning , 1998, ECAI.
[5] Qiang Yang,et al. Delaying Variable Binding Commitments in Planning , 1994, AIPS.
[6] Barry Richards,et al. parcPlan: A Planning Architecture with Parallel Actions, Resources and Constraints , 1994, ISMIS.
[7] Karen L. Myers. A Procedural Knowledge Approach to Task-Level Control , 1996, AIPS.
[8] C T Dinardo,et al. Computers and security , 1986 .
[9] Keith Golden,et al. Representing Sensing Actions: The Middle Ground Revisited , 1996, KR.
[10] Daniel S. Weld,et al. Probabilistic Planning with Information Gathering and Contingent Execution , 1994, AIPS.
[11] Martha E. Pollack,et al. Passive and active decision postponement in plan generation , 1996 .
[12] S. E. Smaha. Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[13] S. Kambhampati. Using Disjunctive orderings instead of Conflict Resolution in Partial order planning , 1996 .
[14] P. Mello,et al. Least Commitment on Variable Binding in Presence of Incomplete Knowledge , 1999, ECP.
[15] Charles E. Kahn,et al. A common intrusion detection framework , 2000 .
[16] Michael J. Maher,et al. Constraint Logic Programming: A Survey , 1994, J. Log. Program..
[17] H. S. Teng,et al. Security audit trail analysis using inductively generated predictive rules , 1990, Sixth Conference on Artificial Intelligence for Applications.
[18] P. Yang. A Theory of Con ict Resolution in , 1992 .
[19] Keith Golden,et al. Planning and knowledge representation for softbots , 1997 .
[20] Evelina Lamma,et al. Constraint Propagation and Value Acquisition: Why we should do it Interactively , 1999, IJCAI.
[21] Daniel S. Weld,et al. Planning to Gather Information , 1996, AAAI/IAAI, Vol. 1.
[22] Daniel S. Weld. An Introduction to Least Commitment Planning , 1994, AI Mag..
[23] Sandeep Kumar,et al. A Software Architecture to Support Misuse Intrusion Detection , 1995 .
[24] M.P. Georgeff,et al. Procedural knowledge , 1986, Proceedings of the IEEE.
[25] Oren Etzioni,et al. OS Agents: Using AI Techniques in the Operating System Environment , 1993 .